DocumentCode :
2856411
Title :
Security Analysis of Two Authenticated Encryption Schemes
Author :
Zhang, Jianhong ; Geng, Qin
Author_Institution :
Coll. of Sci., North China Univ. of Technol., Beijing
fYear :
2008
fDate :
29-31 July 2008
Firstpage :
158
Lastpage :
163
Abstract :
Authenticated encryption scheme is very useful for transmitting a confidential message in insecure networks. Recently, Li et al. give a new forward-security authenticated encryption scheme, and Hung-Yu Chien also give a convertible authenticated encryption scheme. However, our analysis shows that the two schemes are extremely insecure. The common flaw of the two schemes is forgeability and repudiation. After we give the corresponding attack to the two authenticated encryption schemes respectively, we propose two secure publicly verifiable authenticated encryption schemes to overcome the flaws of Li et al. scheme and Hung-Yu Chien scheme. As for efficiency, the computation cost and communication overhead of our proposed schemes are about as small as the two original schemes: Li et al. scheme and Hung-Yu Chien scheme. In second improved scheme, we do not use hash function yet, and the scheme satisfies forward security. Finally, secure proof of the scheme is given.
Keywords :
cryptography; message authentication; authenticated encryption; confidential message transmission; insecure network; security analysis; Authentication; Computational efficiency; Conferences; Cryptography; Educational institutions; Embedded software; Forgery; Information security; authenticated encryption; forward security; security analysis;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Embedded Software and Systems Symposia, 2008. ICESS Symposia '08. International Conference on
Conference_Location :
Sichuan
Print_ISBN :
978-0-7695-3288-2
Type :
conf
DOI :
10.1109/ICESS.Symposia.2008.22
Filename :
4627150
Link To Document :
بازگشت